Todaypsilas informationtechnology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-ad...
详细信息
Todaypsilas informationtechnology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-added by embedding other hidden-service within the main service, hence promoting value-added to the service. The value-added services are accomplished by using the technique of Multiple Keys and Messages Embedding (MKME), which hidden-contents can be retrieved only by applying the correct corresponding decryption keys This paper presents the design and algorithm for multiple keys and messages embedding on 3D Video GIS, based on Steganography concept. The quality of the resulting product was also investigated. The main data used is geospatial video, which is primarily used by the elderly and disables people so that they can feel the surroundings on their desktop while sitting at home.
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student is attentive, drowsy or absent. If teachers can know the student's affective state, they can overcome the difficult. The research applies the image recognition technologies to capture the face images of students when they are learning and analyzes their face features to evaluate the student's affective state by Fuzzy Integral. Finally, teachers can monitor the student's behavior by the detection results on the system interface.
Learner attention affects learning efficiency. However, in many classes, teachers cannot assess the degree of attention of every student. When a teacher is capable of addressing inattentive students immediately, he ca...
详细信息
Learner attention affects learning efficiency. However, in many classes, teachers cannot assess the degree of attention of every student. When a teacher is capable of addressing inattentive students immediately, he can avoid situations in which students are inattentive. Many studies have analyzed student attentiveness by the applying of image detection technologies. If this mechanism can be applied to in-class learning, it will help teachers keep students attentive, and reduce teacher load during class. This study mainly applies fuzzy logic analysis of student facial images when participating in class. Applying fuzzy logic can prevent erroneous judgments associated with a single term, and help teachers deal with student attentiveness.
Clinical guidelines usually need to be adapted to fit local practice before they can be actually used by clinicians. Reasons for adaptation include variations of institution setting such as type of practice and locati...
详细信息
The objective of this study is to propose a model for planning course registration by using a data mining technique: Bayesian network. The proposed model can be used to predict the sequences of courses to be registere...
详细信息
ISBN:
(纸本)9781424414895
The objective of this study is to propose a model for planning course registration by using a data mining technique: Bayesian network. The proposed model can be used to predict the sequences of courses to be registered by undergraduate students whose majors are computerscience or engineering. The data set was obtained from student enrollments and include GPA and grades in each subject for first and second year students from a private university in Thailand. Evaluations show that the predictive power of this model is acceptable. The implications from this studypsilas findings suggest that the model can be applied for advising students in planning courses to be registered in each semester. Further, the model appears to be useful for improving curriculum development in order to fit both studentspsila and university requirements.
Recommendation accuracy is especially important in mobile e-commerce environments due to the limited screen size of mobile devices and relatively expensive connection costs. Mobile content tends to be fashionable and ...
详细信息
ISBN:
(纸本)1601320639
Recommendation accuracy is especially important in mobile e-commerce environments due to the limited screen size of mobile devices and relatively expensive connection costs. Mobile content tends to be fashionable and are geared for young users. This paper presents a novel method of building a more accurate recommender system for mobile content in a mobile ecommerce environment. The method is based on collaborative filtering, and models content diffusion and user preference transition and incorporates them in constructing pseudo ratings from implicit feedback data. In a variety of experiments, recommender systems based on the method showed significantly better recommendation accuracy than a pure collaborative filtering-based recommender system.
The high cost for information security incident response makes organizations hesitate to possess their own expert security team. Also organizations are still reluctant to share their own security circumstances with ex...
详细信息
The high cost for information security incident response makes organizations hesitate to possess their own expert security team. Also organizations are still reluctant to share their own security circumstances with external organizations. By the way, they hope experts will help to defend against cyber threats without losing their reputations. To satisfy these requests of organizations, we propose a security coordination model that supports security incidents response in an organizational architecture, in this paper. Besides, our model has cyber forensic functions for collecting digital evidences from real time monitoring and on-site investigation of the incidents and reporting the analysis results to authorized organizations effectively.
In today's transnational admission environment, evaluating applicant qualifications is becoming increasingly challenging. While standardized tests can be helpful, studies have shown that they are rather noisy pred...
详细信息
ISBN:
(纸本)9781424410835
In today's transnational admission environment, evaluating applicant qualifications is becoming increasingly challenging. While standardized tests can be helpful, studies have shown that they are rather noisy predictors of performance. Predicting educational outcome is a viable alternative in such heterogeneous environments. Performance prediction models can be built by applying data mining techniques to enrollment data. In this paper we present an approach to using Bayesian networks to predict graduating cumulative Grade Point Average based on applicant background at the time of admission. While such prediction models can be helpful, their recommendations may not be followed by departmental faculty members making admission decisions if they are presented as black boxes. We thus present a novel approach to deriving a case-based retrieval mechanism from the Bayesian network prediction model in such a way that the similarity measure used by the case-based system is consistent with the predictive model. The case-based component retrieves the past student most similar to the applicant being evaluated. The Bayesian network model is evaluated using stratified ten-fold cross validation.
This paper presents a novel approach to deriving probabilistic models that predict enrollment given applicant background and the amount of financial aid offered. Our Bayesian network models can be used to optimize var...
详细信息
This paper compares the accuracy of Decision Tree and Bayesian Network algorithms for predicting the academic performance of undergraduate and postgraduate students at two very different academic institutes: Can Tho U...
详细信息
ISBN:
(纸本)9781424410835
This paper compares the accuracy of Decision Tree and Bayesian Network algorithms for predicting the academic performance of undergraduate and postgraduate students at two very different academic institutes: Can Tho University (CTU), a large national university in Viet Nam;and the Asian Institute of technology (AIT), a small international postgraduate institute in Thailand that draws students from 86 different countries. Although the diversity of these two student populations is very different, the data-mining tools were able to achieve similar levels of accuracy for predicting student performance: 73/71% for {fail, fair, good, very good} and 94/93% for {fail, pass} at the CTU/AIT respectively. These predictions are most useful for identifying and assisting failing students at CTU (64% accurate), and for selecting Very Good students for scholarships at the AIT (82% accurate). In this analysis, the Decision Tree was consistently 3-12% more accurate than the Bayesian Network. The results of these case studies give insight into techniques for accurately predicting student performance, compare the accuracy of data mining algorithms, and demonstrate the maturity of open source tools.
暂无评论